Mines require proof of performance

SMART Mining Security Solutions 2024 Mining (Industry)

Africa and its deep connection to the continent’s mineral wealth is undeniable. It is a connection that far precedes the impact that colonialism had across the continent in the first wave of mineral and personnel exploitation. This exploitation continued for many decades, while the continent’s wealth was exported with no benefit to the local populace. Slowly, Africa began to benefit from wealth-sharing initiatives.

Some of the colonial practices, sadly, still exist in some parts of Africa, but the drive towards responsible mining practices in the majority of African states takes continuous effort and attention from security managers, IT directors, health & safety executives and compliance officers. The efforts of these teams of people mean that mining is safer than ever, and mining properties are more secure than ever. Now is the time for more efficient processes and accountability.

The relatively hostile environment and remote locations of mining establishments mean that any electronic/technical implementations have to be easily installed, require little or no maintenance and, once commissioned, require no adjustment. These challenges have seen many come, many try, and most fail, while vast sums of money have been squandered in the pursuit of effective solutions.

How do you avoid repeating past mistakes and installing expensive white elephants?

The most common approach is to ask for specific reference sites.

o This is not a very scientific approach because most reference sites cannot be proven and almost definitely cannot be inspected to see what was installed, how it was installed, and if, in fact, it works as specified and the client is happy.

Visit a trade show.

o Speak to very well-dressed and extremely knowledgeable employees who will sell you ideas with a few specifics and convince you that their way is the only way. (It is worth noting I am also one of these people.)

Request a proof of performance.

o The most reliable way to gauge the performance of the manufacturer’s proposal versus your request, thus identifying any expectation gap, is to have a small-scale installation to replicate your larger requirements and use the products and solution in a real-world environment for a period of time before evaluating the results and then making an educated purchasing decision.

You might want to try any of the above, but any combination of the three would help the decision-making process immeasurably.

The most commonly implemented applications in African mining currently involve UHF technology and vehicle-related issues. Fuel, truck loading/unloading and vehicular movement onsite. UHF is a tricky technology to get right because of its susceptibility to environmental conditions, but if installed correctly can be one of the greatest assets a mine can have onsite. Completely passive technology provides 100% reading 100% of the time. Request a proof of performance and see first hand what is possible.

For more information, contact STid, Jethro Lakin, [email protected], John Lakin, [email protected], www.stid-security.com


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Leading products, trustworthy service
Mining (Industry)
First Distribution Digital Security & IoT aims to be the leading value-added distributor of IP video, advanced video analytics, high-density storage solutions, access control, fire detection, public address, IoT, and networking products in Africa.

Read more...
Key and asset management for mining
Traka Africa Mining (Industry)
Traka specialises in intelligent management solutions for keys and equipment, helping organisations control their important assets, improving productivity and accountability, and reducing risk in critical processes.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Directory of Product and Solution Suppliers
Mining (Industry)
The Directory of Product and Solution Suppliers for the mining industry includes the details of companies that provide products, advice and services to the mining sector, primarily, but not limited to the areas of security and risk.

Read more...
Container conversions for access control
BoomGate Systems Mining (Industry)
The container conversions available from Boomgate Systems offers instant onsite secure access control points for industries and applications such as mines and remote locations where construction projects might be underway.

Read more...
Effective access control for peace of mind
Flow Systems Mining (Industry)
Established in 1975, Flow Systems offers a wide range of physical access control barriers, such as turnstiles, but also includes a wide selection of manual and automatic vehicle boom barrier gates, with or without spikes and/or LEDs.

Read more...
Enhancing overall access control
Turnstar Systems Mining (Industry)
Turnstar’s Titan turnstile offers high security physical access control, which can be integrated with advanced technologies to prevent unauthorised entry to mining facilities.

Read more...
Traffic control and volume analysis
Evolving Management Solutions Mining (Industry)
A LiDAR sensor constantly scans its environment with thousands of measurements that create a 3D model. This allows analysis in terms of volumes, shapes, and distances with greater accuracy than, for example, video analysis.

Read more...